Here at CyberGhost, we consider privacy a basic human right.

It's what we're fighting to protect and the reason we keep no logs. But not everyone shares our vision. Case in point: the various requests we get to disclose the identity of CyberGhost users. Since we’re Bucharest-based and under no obligation from the Romanian law to store connections logs, we can honor our strict no-logs policy. This means we’re unable to comply with requests, even if they are legally binding.

To give you an idea of our judicial landscape, here are the three major types of legal demands we usually receive.

15,819

2015

43,647

2016

42,805

2017

27,747

2018

DMCA complaints

We usually receive Digital Millennium Copyright Act complaints from various law firms representing production companies. Most often, they indicate that copyrighted material was illegally shared via a CyberGhost IP. We're also provided with details like the timestamp of a torrent or the port used.

4,895

2015

10,362

2016

7,876

2017

11,116

2018

Malware Activity Flags

The complaints grouped in this category usually come from website owners or app developers and have to do with DDoS, botnets, scams, log-in attempts, or automated emails being send from CyberGhost IPs. Sometimes, data centers we work with around the world forward us complaints.

71

2015

40

2016

17

2017

37

2018

Police requests

Various law enforcement agencies or police departments can request logs or more information about an IP linked to an investigation or a case. These inquiries usually reach our data center collaborators first, and then get forwarded to us.

Tackling abuse on our end

Over the years, we’ve taken our own measures to reduce the number of violations committed by using CyberGhost. For example, analyzing the ports used for torrent streaming and blocking them in countries where specific laws are in place turned out to be efficient.

And RE: malware activities, since most of the complaints specify the source of the attack, as well as the victim’s IP, we resorted to blocking access to the attacked IP, making further exploits impossible.

Also, a not-so-gentle reminder from our Legal team: by using our VPN, you have agreed to comply with our Terms and Conditions